Certified Information Systems Security Professional (CISSP)

Certified Information Systems Security Professional (CISSP)

WHATSAPP

Descarga el catálogo de cursos

Modalidad

Online en vivo

Duración (horas)

40 horas

Horario

6:30 p.m. a 9:30 p.m.

Overview

The Certified Information Systems Security Professional (CISSP) is the most globally recognized certification in the information security market. CISSP validates an information security professional’s deep technical and managerial knowledge and experience to effectively design, engineer, and manage the overall security posture of an organization.

CISSP certification is a unique IT certification because it requires a demonstrated fundamental understanding of the eight domains of cybersecurity and documented proof of experience in the information security and architecture field. This training course helps students acquire a broad range of cybersecurity skills, from developing security policies to managing risk to understanding technical security controls.

Objectives

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.

You will:

  • Analyze components of the Security and Risk Management domain.
  • Analyze components of the Asset Security domain.
  • Analyze components of the Security Architecture and Engineering domain.
  • Analyze components of the Communications and Network Security domain.
  • Analyze components of the Identity and Access Management domain.
  • Analyze components of the Security Assessment and Testing domain.
  • Analyze components of the Security Operations domain.
  • Analyze components of the Software Development Security domain.

Audience

The CISSP certification preparatory course teaches students how to design, build and maintain a secure business IT architecture using globally approved security standards. Students learn about the eight domains of knowledge, as determined by (ISC)2, that form a critical part of the CISSP® exam. The course covers each knowledge domain in depth and explains how they relate to each other and other critical areas of information security.

(ISC)² was founded in 1989 as the International Information System Security Certification Consortium, Inc., an international, nonprofit membership association for information security leaders. That same year, (ISC)² published the first Common Body of Knowledge (CBK) to document best practices, skills, and techniques for security professionals. Today the CISSP certification is internationally recognized and respected as the premier cybersecurity professional credential.

CISSP certification is a unique IT certification because it requires a demonstrated fundamental understanding of the eight domains of cybersecurity and documented proof of experience in the information security and architecture field. This training course helps students acquire a broad range of cybersecurity skills, from developing security policies to managing risk to understanding technical security controls.

Prerequisites

Candidates must have a minimum of five years cumulative paid work experience in two or more of the eight domains of the CISSP outline. Earning a four year college degree or regional equivalent or an additional credential from the ISC2 approved list will satisfy one year of the required experience. Education credit will only satisfy one year of experience.

Outline

  • Understand, adhere to, and promote professional ethics
  • Understand and apply security concepts
  • Evaluate and apply security governance principles
  • Determine compliance and other requirements
  • Understand legal and regulatory issues that pertain to information security in a holistic context
  • Understand requirements for investigation types (i.e., administrative, criminal, civil, regulatory, industry standards)
  • Business Continuity Plan Fundamentals
  • Develop, document, and implement security policy, standards, procedures, and guidelines
  • Identify, analyze, and prioritize Business Continuity (BC) requirements
  • Contribute to and enforce personnel security policies and procedures
  • Understand and apply risk management concepts
  • Understand and apply threat modeling concepts and methodologies
  • Apply Supply Chain Risk Management (SCRM) concepts
  • Establish and maintain a security awareness, education, and training program
  • Identify and classify information and assets
  • Establish information and asset handling requirements
  • Provision resources securely
  • Manage data lifecycle
  • Ensure appropriate asset retention (e.g., End-of-Life (EOL), End-of-Support (EOS))
  • Determine data security controls and compliance requirements
  • Research, implement and manage engineering processes using secure design principles
  • Understand the fundamental concepts of security models (e.g., Biba, Star Model, Bell-LaPadula)
  • Select controls based upon systems security requirements
  • Understand security capabilities of Information Systems (IS) (e.g., memory protection, Trusted Platform Module (TPM), encryption/decryption)
  • Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
  • Select and determine cryptographic solutions
  • Understand methods of cryptanalytic attacks
  • Apply security principles to site and facility design
  • Design site and facility security controls
  • Assess and implement secure design principles in network architectures
  • Secure network components
  • Implement secure communication channels according to design
  • Control physical and logical access to assets
  • Manage identification and authentication of people, devices, and services
  • Federated identity with a third-party service
  • Implement and manage authorization mechanisms
  • Manage the identity and access provisioning lifecycle
  • Implement authentication systems
  • Design and validate assessment, test, and audit strategies
  • Conduct security control testing
  • Collect security process data (e.g., technical and administrative)
  • Analyze test output and generate report
  • Conduct or facilitate security audits
  • Understand and comply with investigations
  • Conduct logging and monitoring activities
  • Perform Configuration Management (CM) (e.g., provisioning, baselining, automation)
  • Apply foundational security operations concepts
  • Apply resource protection
  • Conduct incident management
  • Operate and maintain detective and preventative measures
  • Implement and support patch and vulnerability management
  • Understand and participate in change management processes
  • Implement recovery strategies
  • Implement Disaster Recovery (DR) processes
  • Test Disaster Recovery Plans (DRP)
  • Participate in Business Continuity (BC) planning and exercises
  • Implement and manage physical security
  • Address personnel safety and security concerns
  • Understand and integrate security in the Software Development Life Cycle (SDLC)
  • Identify and apply security controls in software development ecosystems
  • Assess the effectiveness of software security
  • Assess security impact of acquired software

• Define and apply secure coding guidelines and standards

Related Certification

También te puede interesar

Descarga el catálogo de cursos

WHATSAPP